{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:15:19Z","timestamp":1725754519512},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642417061"},{"type":"electronic","value":"9783642417078"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41707-8_15","type":"book-chapter","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T06:56:38Z","timestamp":1383116198000},"page":"223-238","source":"Crossref","is-referenced-by-count":6,"title":["Guided Algebraic Specification Mining for Failure Simplification"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Elyasov","sequence":"first","affiliation":[]},{"given":"I. S. Wishnu B.","family":"Prasetya","sequence":"additional","affiliation":[]},{"given":"Jurriaan","family":"Hage","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Beschastnikh, I., Brun, Y., Schneider, S., Sloan, M., Ernst, M.D.: Leveraging existing instrumentation to automatically infer invariant-constrained models. In: ESEC\/FSE, pp. 267\u2013277 (2011)","key":"15_CR1","DOI":"10.1145\/2025113.2025151"},{"doi-asserted-by":"crossref","unstructured":"Book, R.V., Otto, F.: String-rewriting systems (1993)","key":"15_CR2","DOI":"10.1007\/978-1-4613-9771-7"},{"doi-asserted-by":"crossref","unstructured":"Csallner, C., Tillmann, N., Smaragdakis, Y.: DySy: dynamic symbolic execution for invariant inference. In: ICSE, pp. 281\u2013290 (2008)","key":"15_CR3","DOI":"10.1145\/1368088.1368127"},{"doi-asserted-by":"crossref","unstructured":"Dallmeier, V., Lindig, C., Wasylkowski, A., Zeller, A.: Mining object behavior with ADABU. In: WODA, pp. 17\u201324 (2006)","key":"15_CR4","DOI":"10.1145\/1138912.1138918"},{"doi-asserted-by":"crossref","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. Journal of the American Society for Information Science\u00a041 (1990)","key":"15_CR5","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"doi-asserted-by":"crossref","unstructured":"Ernst, M.D., Perkins, J.H., Guo, P.J., McCamant, S., Pacheco, C., Tschantz, M.S., Xiao, C.: The daikon system for dynamic detection of likely invariants. Sci. Comput. Program., 35\u201345 (2007)","key":"15_CR6","DOI":"10.1016\/j.scico.2007.01.015"},{"doi-asserted-by":"crossref","unstructured":"Gabel, M., Su, Z.: Online inference and enforcement of temporal properties. In: ICSE, pp. 15\u201324 (2010)","key":"15_CR7","DOI":"10.1145\/1806799.1806806"},{"doi-asserted-by":"crossref","unstructured":"Ghezzi, C., Mocci, A., Monga, M.: Efficient recovery of algebraic specifications for stateful components. In: IWPSE, pp. 98\u2013105 (2007)","key":"15_CR8","DOI":"10.1145\/1294948.1294972"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00260922","volume":"10","author":"J.V. Guttag","year":"1978","unstructured":"Guttag, J.V., Horning, J.J.: The algebraic specification of abstract data types. Acta Informatica\u00a010, 27\u201352 (1978)","journal-title":"Acta Informatica"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-540-45070-2_19","volume-title":"ECOOP 2003 - Object-Oriented Programming","author":"J. Henkel","year":"2003","unstructured":"Henkel, J., Diwan, A.: Discovering algebraic specifications from java classes. In: Cardelli, L. (ed.) ECOOP 2003. LNCS, vol.\u00a02743, pp. 431\u2013456. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Jin, W., Orso, A.: BugRedux: Reproducing Field Failures for In-house Debugging. In: ICSE (2012)","key":"15_CR11","DOI":"10.1109\/ICSE.2012.6227168"},{"doi-asserted-by":"crossref","unstructured":"Kontogiannis, K., Wasfy, A., Mankovskii, S.: Event clustering for log reduction and run time system understanding. In: SAC, pp. 191\u2013192 (2011)","key":"15_CR12","DOI":"10.1145\/1982185.1982229"},{"doi-asserted-by":"crossref","unstructured":"Lee, K.H., Zheng, Y., Sumner, N., Zhang, X.: Toward generating reducible replay logs. In: PLDI, pp. 246\u2013257 (2011)","key":"15_CR13","DOI":"10.1145\/1993316.1993528"},{"issue":"9","key":"15_CR14","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1016\/j.jss.2012.04.001","volume":"85","author":"D. Lo","year":"2012","unstructured":"Lo, D., Mariani, L., Santoro, M.: Learning extended FSA from software: An empirical assessment. Journal of Systems and Software\u00a085(9), 2063\u20132076 (2012)","journal-title":"Journal of Systems and Software"},{"doi-asserted-by":"crossref","unstructured":"Lorenzoli, D., Mariani, L., Pezz\u00e8, M.: Automatic generation of software behavioral models. In: ICSE, pp. 501\u2013510 (2008)","key":"15_CR15","DOI":"10.1145\/1368088.1368157"},{"doi-asserted-by":"crossref","unstructured":"Makanju, A., Brooks, S., Zincir-Heywood, A., Milios, E.: LogView: Visualizing event log clusters. In: PST, pp. 99\u2013108 (2008)","key":"15_CR16","DOI":"10.1109\/PST.2008.17"},{"doi-asserted-by":"crossref","unstructured":"Marchetto, A., Tonella, P., Ricca, F.: State-based testing of ajax web applications. In: 2008 1st International Conference on Software Testing, Verification, and Validation, pp. 121\u2013130 (2008)","key":"15_CR17","DOI":"10.1109\/ICST.2008.22"},{"doi-asserted-by":"crossref","unstructured":"Mariani, L., Pastore, F.: Automated identification of failure causes in system logs. In: ISSRE, pp. 117\u2013126 (2008)","key":"15_CR18","DOI":"10.1109\/ISSRE.2008.48"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, T., Kapur, D., Weimer, W., Forrest, S.: Using dynamic analysis to discover polynomial and array invariants. In: ICSE, pp. 683\u2013693 (2012)","key":"15_CR19","DOI":"10.1109\/ICSE.2012.6227149"},{"unstructured":"Prasetya, I.S.W.B., Middelkoop, A., Elyasov, A., Hage, J.: D6.1: Fittest logging approach (2011)","key":"15_CR20"},{"doi-asserted-by":"crossref","unstructured":"Shahamiri, S.R., Wan-Kadir, W.M.N., Ibrahim, S., MohdHashim, S.: An automated framework for software test oracle. Information and Software Technology (2011)","key":"15_CR21","DOI":"10.1016\/j.infsof.2011.02.006"},{"doi-asserted-by":"crossref","unstructured":"Tonella, P., Nguyen, C.D., Marchetto, A., Kessler, F.B., Lakhotia, K., Harman, M.: Automated generation of state abstraction functions using data invariant inference (2013)","key":"15_CR22","DOI":"10.1109\/IWAST.2013.6595795"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Parnas, D.L.: Simulating the behavior of software modules by trace rewriting. IEEE Transactions on Software Engineering, 750\u2013759 (1994)","key":"15_CR23","DOI":"10.1109\/32.328996"},{"doi-asserted-by":"crossref","unstructured":"Yang, J., Evans, D.: Dynamically inferring temporal properties. In: PASTE, pp. 23\u201328 (2004)","key":"15_CR24","DOI":"10.1145\/996821.996832"},{"unstructured":"Yu, Y., Wang, Y., Mylopoulos, J., Liaskos, S., Lapouchnian, A., do Prado Leite, J.C.S.: Reverse engineering goal models from legacy code. In: RE, pp. 363\u2013372 (2005)","key":"15_CR25"},{"doi-asserted-by":"crossref","unstructured":"Zawawy, H., Kontogiannis, K., Mylopoulos, J.: Log filtering and interpretation for root cause analysis. In: ICSM, pp. 1\u20135 (2010)","key":"15_CR26","DOI":"10.1109\/ICSM.2010.5609556"},{"doi-asserted-by":"crossref","unstructured":"Zeller, A.: Isolating cause-effect chains from computer programs. In: FSE, pp. 1\u201310 (2002)","key":"15_CR27","DOI":"10.1145\/587052.587053"},{"doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhan, J., Meng, D., Xu, D., Zhang, Z.: LogMaster: Mining event correlations in logs of large scale cluster systems. CoRR (2010)","key":"15_CR28","DOI":"10.1007\/978-3-642-15672-4_23"}],"container-title":["Lecture Notes in Computer Science","Testing Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41707-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T22:03:46Z","timestamp":1558649026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41707-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642417061","9783642417078"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41707-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}